What Is Remote Browsing?

Remote browsing is a method of browsing the internet using a browser that is hosted in the cloud, rather than installed locally on your PC or laptop and is an effective way of isolating yourself from malware.

According to Gartner, more than 50% of enterprises will begin to adopt remote browsers in order to reduce the impact of cyber attacks over the next three years, they also recommend remote browsers as one of the most effective ways that an enterprise can reduce web based malware attacks. Against this backdrop, lets take a closer look at exactly what remote browsers are and why they are being adopted by individuals, SME's and the enterprise.

The problem with a locally installed browser is that, because it lives on your local machine, when it picks up a malware or ransomware infection, the infection spreads from your browser to your machine and network. If your PC or laptop is connected to a corporate network, the infection could spread to the rest of the organization.

We know that most cyberattacks begin with the browser, we understand that the browser is the window cyber-criminals use to climb into our businesses, but our browsers are so useful to our every day work, that we keep leaving the window open. But there is a better way, you can leverage remote browsers to put a WEBGAP between you and the malware, a WEBGAP is effectively an air-gap between you and the internet nasties that live there.

With remote browsing, instead of using your locally installed browser to browse the public internet, (which exposes your PC or laptop to malware infections), you use a physically isolated remote browser hosted in the cloud. When using a remote browser, if you do happen to pick up a malware or ransomware infection during the course of your browsing session, it is confined to the browsers cloud infrastructure and unable to leap across the air-gap to your local machine.

By physically isolating your browsing activity away from your local machine and networks, you are shutting down the most common infiltration/exfiltration point and dramatically enhancing your overall cybersecurity posture in the progress. When you isolate your browser, you also isolate the malware, ransomware and browser based cyberattacks by default.

In high security environments this is considered by practice and cybersecurity teams now view internet users browsing on local machines, through the local network as a huge security risk. By giving their users a remote browser and shutting down local internet access, they push all of their users browsing activity and the associated cyber-risk out of their environment.

Even if you work does not involve you using the public internet on a regular basis, it is still unwise to use your local browser on your work machine. At any point you could pick up a malware or ransomware infection that will have climbed in through the open window that is your browser. Cybersecurity best practice dictates that you should not expose your local PC or laptop to the public internet, its the easiest way to get infected. Instead you should isolate your risky browsing activity away from your machine using a remote browser, physically isolating browser based cyber-attacks in the process.

If you are looking for a cost-effective remote browser, have a browse through our website and check out our remote browsing solution. We have been delivering remote browsers longer than most and I led the team that built the worlds first production remote browsing platform for the US federal government. Get in touch for a conversation with us!

EDITORIAL NOTE: What’s that? You like the things we write? Follow @WEB_GAP on Twitter for more!

Previous PostWhat Is Browser Isolation
Next PostHow Does Remote Browser Isolation Work?